Hacked: Hacking Finance

Apple Vice President: FBI Backdoor Request Will Cause Hacker Havoc


Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.


Alleged FBI Hacker Lauri Love Ordered to US Extradition by UK Home Secretary 15th November, 2016

The Largest Breach of 2016: 412 Million FriendFinder Accounts Exposed 14th November, 2016


Apple Vice President: FBI Backdoor Request Will Cause Hacker Havoc

Posted on .

Apple’s chief software engineer and vice president, Craig Federighi has, in an op-ed in the Washington Post, echoed Apple CEO Tim Cook’s take on the fierce encryption backdoor debate between the FBI and Apple.

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

The chief software engineer at Apple and senior vice president of software engineering at the company, Craig Federighi has spoken about his disappointment in the requests by the FBI, Justice Department and other law enforcement agencies seeking a backdoor for the iPhone.

Federighi penned an op-ed in the Washington Post on Sunday, arguing that such a backdoor, once created, will become “a weakness that hackers and criminals could use to wreck havoc on the privacy and personal safety” of all iPhone users.

In his expert opinion, he cites that today’s connected world is one wherein a user’s mobile phone is more than a simple telephoning personal device. He claimed:

Your phone is more than a personal device. In today’s mobile, networked worked, it’s part of the security perimeter that protects your family and co-workers. Our nation’s vital infrastructure – such as power grids and transportation hubs – becomes more vulnerable when individual devices get hacked.

He argued that cybercriminals and even terrorists who are looking at ways to disrupt and infiltrate networks could see a target’s smartphone as the point of access to a large scale attack.

Noting that the security and safety of Apple’s customers is the most important part of his job, he contended that the encryption technology that’s embedded in present-day iPhones are “the best data security available to consumers.”

Furthermore, he added:

[C]ryptographic protections on the device don’t just help prevent unauthorized access to your personal data – they’re also a critical line of defense against criminals who seek to implant malware or spyware.

The encryption technology, Federighi claimed, also represents a blockade against hackers using the device of an unsuspecting user to gain access to government agencies, public utitlies or businesses.

Malicious software, just like great software can spread rapidly at the blink of an eye and has the capacity to bring harm to millions of people around the world, he added.

 Featured image from Pexels.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.

Feedback or Requests?


Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.

  • user

    AUTHOR Sillie Abbe

    Posted on 8:17 am March 8, 2016.

    There is a backdoor.already

    Something crucial is apparently overlooked in the discussions over the backdoor. iPhone and many other smart devices already have valid backdoors, namely, a fingerprint scanner or a set of camera and software for capturing faces, irises and other body features, which can be collected from the unyielding, sleeping, unconscious and dead people.

    It is now known that the authentication by biometrics usually comes with poorer security than PIN/password-only authentication. If Apple wants to claim that they are conscious of privacy and security, they could tell consumers to turn off the biometric functions. If the authority wants to have those backdoors open, they could tell consumers to keep them turned on all the times. And, security-conscious consumers could certainly refrain from turning them on.

  • View Comments (1) ...
    Researchers from security firm Palo Alto Networks have discovered the…